0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (87)
  • R500+ (1,274)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Advances in Information Processing and Protection (Hardcover, 2007 ed.): Jerzy Pejas, Khalid Saeed Advances in Information Processing and Protection (Hardcover, 2007 ed.)
Jerzy Pejas, Khalid Saeed
R5,220 Discovery Miles 52 200 Ships in 18 - 22 working days

This book contains a selection of the best papers given at an international conference on advanced computer systems. The Advanced Computer Systems Conference was held in October 2006, in Miedzyzdroje, Poland. The book is organized into four topical areas: Artificial Intelligence; Computer Security and Safety; Image Analysis, Graphics and Biometrics; and Computer Simulation and Data Analysis.

Research Advances in Database and Information Systems Security - IFIP TC11 WG11.3 Thirteenth Working Conference on Database... Research Advances in Database and Information Systems Security - IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA (Hardcover, 2000 ed.)
Vijay Atluri, John Hale
R2,844 Discovery Miles 28 440 Ships in 18 - 22 working days

Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Internet and www facilities, database and information systems security remains a key topic in businesses and in the public sector, with implications for the whole of society. Research Advances in Database and Information Systems Security covers issues related to security and privacy of information in a wide range of applications, including: Critical Infrastructure Protection; Electronic Commerce; Information Assurance; Intrusion Detection; Workflow; Policy Modeling; Multilevel Security; Role-Based Access Control; Data Mining; Data Warehouses; Temporal Authorization Models; Object-Oriented Databases. This book contains papers and panel discussions from the Thirteenth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 25-28, 1999, in Seattle, Washington, USA. Research Advances in Database and Information Systems Security provides invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners engaged in database security research and development.

Protocols and Procedures of Cryptography and Network Security (Hardcover): Stephen Mason Protocols and Procedures of Cryptography and Network Security (Hardcover)
Stephen Mason
R1,801 Discovery Miles 18 010 Ships in 10 - 15 working days
Biometric Solutions - For Authentication in an E-World (Hardcover, 2002 ed.): David D. Zhang Biometric Solutions - For Authentication in an E-World (Hardcover, 2002 ed.)
David D. Zhang
R4,261 Discovery Miles 42 610 Ships in 18 - 22 working days

Biometric Solutions for Authentication in an E-World provides a collection of sixteen chapters containing tutorial articles and new material in a unified manner. This includes the basic concepts, theories, and characteristic features of integrating/formulating different facets of biometric solutions for authentication, with recent developments and significant applications in an E-world. This book provides the reader with a basic concept of biometrics, an in-depth discussion exploring biometric technologies in various applications in an E-world. It also includes a detailed description of typical biometric-based security systems and up-to-date coverage of how these issues are developed. Experts from all over the world demonstrate the various ways this integration can be made to efficiently design methodologies, algorithms, architectures, and implementations for biometric-based applications in an E-world.

Research Directions in Data and Applications Security - IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications... Research Directions in Data and Applications Security - IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK (Hardcover, 2003 ed.)
Ehud Gudes, Sujeet Shenoi
R2,848 Discovery Miles 28 480 Ships in 18 - 22 working days

Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include:

-Role-Based Access Control;
-Database Security;
-XML Security;
-Data Mining and Inference;
-Multimedia System Security;
-Network Security;
-Public Key Infrastructure;
-Formal Methods and Protocols;
-Security and Privacy.

Handbook of Database Security - Applications and Trends (Hardcover): Michael Gertz, Sushil Jajodia Handbook of Database Security - Applications and Trends (Hardcover)
Michael Gertz, Sushil Jajodia
R4,119 Discovery Miles 41 190 Ships in 18 - 22 working days

Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security in different application settings, this book includes an outline for future research directions within the field. The book is designed for industry practitioners and researchers, and is also suitable for advanced-level students in computer science.

Cryptographic Methods (Hardcover): Abdul Razaque, Fathi Amsaad, Abrar Alajlan Cryptographic Methods (Hardcover)
Abdul Razaque, Fathi Amsaad, Abrar Alajlan
R1,333 Discovery Miles 13 330 Ships in 18 - 22 working days
The Era of NFTs - A Beginner's Guide To Understanding The Utility & Investment Opportunity Of Non-Fungible Tokens (NFTs)... The Era of NFTs - A Beginner's Guide To Understanding The Utility & Investment Opportunity Of Non-Fungible Tokens (NFTs) (Hardcover)
Alex Caine, Matthew Thrush
R711 Discovery Miles 7 110 Ships in 10 - 15 working days
Applied Quantum Cryptography (Hardcover, 2010 Ed.): Christian Kollmitzer, Mario Pivk Applied Quantum Cryptography (Hardcover, 2010 Ed.)
Christian Kollmitzer, Mario Pivk
R2,056 Discovery Miles 20 560 Ships in 10 - 15 working days

Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel technology. Only a few years ago quantum cryptography or better: quantum key distribution (QKD) was the domain of basic research laboratories at universities. But during the last few years things changed. QKD left the laboratories and was picked up by more practical oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research.

One major milestone towards a QKD technology was a large research and development project funded by the European Commission that aimed at combining quantum physics with complementary technologies that are necessary to create a technical solution: electronics, software, and network components were added within the project SECOQC (Development of a Global Network for Secure Communication based on Quantum Cryptography) that teamed up all expertise on European level to get a technology for future encryption.

The practical application of QKD in a standard optical fibre network was demonstrated October 2008 in Vienna, giving a glimpse of the future of secure communication. Although many steps have still to be done in order to achieve a real mature technology, the corner stone for future secure communication is already laid.

QKD will not be the Holy Grail of security, it will not be able to solve all problems for evermore. But QKD has the potential to replace one of the weakest parts of symmetric encryption: the exchange of the key. It can be proven that the key exchange process cannot be corrupted and that keys that are generated and exchanged quantum cryptographically will be secure for ever (as long as some additional conditions are kept).

This book will show the state of the art of Quantum Cryptography and it will sketch how it can be implemented in standard communication infrastructure. The growing vulnerability of sensitive data requires new concepts and QKD will be a possible solution to overcome some of today s limitations."

Database and Application Security XV - IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application... Database and Application Security XV - IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada (Hardcover, 2002 ed.)
Martin S Olivier, David L. Spooner
R2,839 Discovery Miles 28 390 Ships in 18 - 22 working days

Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the rapid growth of large databases and the application systems that manage them, security issues have become a primary concern in business, industry, government and society. These concerns are compounded by the expanding use of the Internet and wireless communication technologies.

This volume covers a wide variety of topics related to security and privacy of information in systems and applications, including:

  • Access control models;
  • Role and constraint-based access control;
  • Distributed systems;
  • Information warfare and intrusion detection;
  • Relational databases;
  • Implementation issues;
  • Multilevel systems;
  • New application areas including XML.

Database and Application Security XV contains papers, keynote addresses, and panel discussions from the Fifteenth Annual Working Conference on Database and Application Security, organized by the International Federation for Information Processing (IFIP) Working Group 11.3 and held July 15-18, 2001 in Niagara on the Lake, Ontario, Canada.

Alice and Bob Learn Application Security (Paperback): T Janca Alice and Bob Learn Application Security (Paperback)
T Janca
R1,116 R918 Discovery Miles 9 180 Save R198 (18%) Ships in 9 - 17 working days

Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: Secure requirements, design, coding, and deployment Security Testing (all forms) Common Pitfalls Application Security Programs Securing Modern Applications Software Developer Security Hygiene Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs. Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.

Secure Multi-Party Non-Repudiation Protocols and Applications (Hardcover, 1st Edition.
2nd Printing. 2008): Jose A. Onieva,... Secure Multi-Party Non-Repudiation Protocols and Applications (Hardcover, 1st Edition. 2nd Printing. 2008)
Jose A. Onieva, Jianying Zhou
R2,658 Discovery Miles 26 580 Ships in 18 - 22 working days

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level text or reference book for students in computer science.

Luck Follows the Brave - From Refugee Camps, Abuse, and Suicide Loss to Living the Dream (Hardcover, Hardback ed.): Aida S?ibic? Luck Follows the Brave - From Refugee Camps, Abuse, and Suicide Loss to Living the Dream (Hardcover, Hardback ed.)
Aida Šibić; Edited by Laura L Bush
R697 R646 Discovery Miles 6 460 Save R51 (7%) Ships in 18 - 22 working days
Biometrics, Computer Security Systems and Artificial Intelligence Applications (Hardcover, 2006 ed.): Khalid Saeed, Jerzy... Biometrics, Computer Security Systems and Artificial Intelligence Applications (Hardcover, 2006 ed.)
Khalid Saeed, Jerzy Pejas, Romuald Mosdorf
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains over 30 articles by well-known scientists and engineers. The articles are extended versions of works introduced at the ACS-CISIM 2005 conference.

Recent Advances in RSA Cryptography (Hardcover, 2001 ed.): Stefan Katzenbeisser Recent Advances in RSA Cryptography (Hardcover, 2001 ed.)
Stefan Katzenbeisser
R2,732 Discovery Miles 27 320 Ships in 18 - 22 working days

Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against low-exponent RSA, Hastad's broadcast attack, and Franklin-Reiter attacks). Finally, the last chapter reviews the use of the RSA function in signature schemes. Recent Advances in RSA Cryptography is of interest to graduate level students and researchers who will gain an insight into current research topics in the field and an overview of recent results in a unified way. Recent Advances in RSA Cryptography is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.

Software Exorcism - A Handbook for Debugging and Optimizing Legacy Code (Hardcover, 1st ed.): Bill Blunden Software Exorcism - A Handbook for Debugging and Optimizing Legacy Code (Hardcover, 1st ed.)
Bill Blunden
R1,044 R898 Discovery Miles 8 980 Save R146 (14%) Ships in 18 - 22 working days

YOU HAVE TO OWN THIS BOOK!

"Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code" takes an unflinching, no bulls$&# look at behavioral problems in the software engineering industry, shedding much-needed light on the social forces that make it difficult for programmers to do their job. Do you have a co-worker who perpetually writes bad code that "you" are forced to clean up? This is your book. While there are plenty of books on the market that cover debugging and short-term workarounds for bad code, Reverend Bill Blunden takes a revolutionary step beyond them by bringing our attention to the underlying illnesses that plague the software industry as a whole.

Further, "Software Exorcism" discusses tools and techniques for effective and aggressive debugging, gives optimization strategies that appeal to all levels of programmers, and presents in-depth treatments of technical issues with honest assessments that are not biased toward proprietary solutions.

The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.): Joan Daemen, Vincent Rijmen The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.)
Joan Daemen, Vincent Rijmen 1
R2,702 Discovery Miles 27 020 Ships in 10 - 15 working days

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This book is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.

Information Security Management Handbook (Hardcover, 6th edition): Harold F. Tipton, Micki Krause Information Security Management Handbook (Hardcover, 6th edition)
Harold F. Tipton, Micki Krause
R26,390 Discovery Miles 263 900 Ships in 10 - 15 working days

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.

IT Security Governance Guidebook with Security Program Metrics on CD-ROM (Hardcover): Fred Cohen IT Security Governance Guidebook with Security Program Metrics on CD-ROM (Hardcover)
Fred Cohen
R4,071 Discovery Miles 40 710 Ships in 10 - 15 working days

The IT Security Governance Guidebook with Security Program Metrics provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying downloadable resources offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model provided in the text, allowing an enterprise to measure its overall information protection program.

Machine Learning and Data Mining for Computer Security - Methods and Applications (Hardcover, 2006 ed.): Marcus A. Maloof Machine Learning and Data Mining for Computer Security - Methods and Applications (Hardcover, 2006 ed.)
Marcus A. Maloof
R3,902 Discovery Miles 39 020 Ships in 18 - 22 working days

"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security.

The first part of the book surveys the data sources, the learning and mining methods, evaluation methodologies, and past work relevant for computer security. The second part of the book consists of articles written by the top researchers working in this area. These articles deals with topics of host-based intrusion detection through the analysis of audit trails, of command sequences and of system calls as well as network intrusion detection through the analysis of TCP packets and the detection of malicious executables.

This book fills the great need for a book that collects and frames work on developing and applying methods from machine learning and data mining to problems in computer security.

Security in the Information Society - Visions and Perspectives (Hardcover, 2002 ed.): M.Adeeb Ghonaimy, Mahmoud T. El-Hadidi,... Security in the Information Society - Visions and Perspectives (Hardcover, 2002 ed.)
M.Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan
R4,335 Discovery Miles 43 350 Ships in 18 - 22 working days

Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security; Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt. This volume is essential reading for scholars, researchers, and practitioners interested inkeeping pace with the ever-growing field of Information Security.

Strategic Information Security (Hardcover): John Wylder Strategic Information Security (Hardcover)
John Wylder
R3,088 Discovery Miles 30 880 Ships in 10 - 15 working days

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now, however, most books about strategy and planning have focused on the production side of the business, rather than operations.

Strategic Information Security integrates the importance of sound security policy with the strategic goals of an organization. It provides IT professionals and management with insight into the issues surrounding the goals of protecting valuable information assets. This text reiterates that an effective information security program relies on more than policies or hardware and software, instead it hinges on having a mindset that security is a core part of the business and not just an afterthought.

Armed with the content contained in this book, security specialists can redirect the discussion of security towards the terms and concepts that management understands. This increases the likelihood of obtaining the funding and managerial support that is needed to build and maintain airtight security programs.

Verifiable Composition of Signature and Encryption - A Comprehensive Study of the Design Paradigms (Hardcover, 1st ed. 2017):... Verifiable Composition of Signature and Encryption - A Comprehensive Study of the Design Paradigms (Hardcover, 1st ed. 2017)
Laila El Aimani
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data. This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way. This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.

The Austin Protocol Compiler (Hardcover, 2005 ed.): Tommy M McGuire, Mohamed G Gouda The Austin Protocol Compiler (Hardcover, 2005 ed.)
Tommy M McGuire, Mohamed G Gouda
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

There are two groups of researchers who are interested in designing network protocols and who cannot (yet) effectively communicate with one another c- cerning these protocols. The first is the group of protocol verifiers, and the second is the group of protocol implementors. The main reason for the lack of effective communication between these two groups is that these groups use languages with quite different semantics to specify network protocols. On one hand, the protocol verifiers use specification languages whose semantics are abstract, coarse-grained, and with large atom- ity. Clearly, protocol specifications that are developed based on such semantics are easier to prove correct. On the other hand, the protocol implementors use specification languages whose semantics are concrete, fine-grained, and with small atomicity. Protocol specifications that are developed based on such - mantics are easier to implement using system programming languages such as C, C++, and Java. To help in closing this communication gap between the group of protocol verifiers and the group of protocol implementors, we present in this monograph a protocol specification language called the Timed Abstract Protocol (or TAP, for short) notation. This notation is greatly influenced by the Abstract Protocol Notation in the textbook Elements of Network Protocol Design, written by the second author, Mohamed G. Gouda. The TAP notation has two types of sem- tics: an abstract semantics that appeals to the protocol verifiers and a concrete semantics thatappeals to the protocol implementors group.

Research Directions in Data and Applications Security XVIII - IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and... Research Directions in Data and Applications Security XVIII - IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain (Hardcover, New edition)
Csilla Farkas, Pierangela Samarati
R2,868 Discovery Miles 28 680 Ships in 18 - 22 working days

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and Applications Security XVIII presents original unpublished research results, practical experiences, and innovative ideas in the field of data and applications security and privacy. Topics presented in this volume include:
-Database theory;
-Inference control;
-Data protection techniques;
-Distributed systems;
-Access control models;
-Security policy;
-Design and management;
-Privacy;
-Network security.

This book is the eighteenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It contains twenty-three papers and two invited talks that were presented at the Eighteenth Annual IFIP WG 11.3 Conference on Data and Applications Security, which was sponsored by IFIP and held in Sitges, Catalonia, Spain in July 2004.

Research Directions in Data and Applications Security XVIII is a high-quality reference volume that addresses several aspects of information protection, and is aimed at researchers, educators, students, and developers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Betrayal
Lesley Pearse Paperback R395 R365 Discovery Miles 3 650
Advances in Computers, Volume 126
Suyel Namasudra Hardcover R3,930 Discovery Miles 39 300
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, … Hardcover R2,861 Discovery Miles 28 610
Misbelief - What Makes Rational People…
Dan Ariely Paperback R350 R317 Discovery Miles 3 170
Information Organization of the Universe…
A Cardon Hardcover R3,743 Discovery Miles 37 430
The Lost Boys
Faye Kellerman Paperback R330 R227 Discovery Miles 2 270
Object-oriented Programming Languages…
Dorian P. Yeager Mixed media product R2,034 R1,666 Discovery Miles 16 660
Multi-Threaded Object-Oriented MPI-Based…
Jean-Marc Adamo Hardcover R4,116 Discovery Miles 41 160
Python for Beginners - A complete…
Aiden Phillips Hardcover R897 R776 Discovery Miles 7 760
Atmosphere
Taylor Jenkins Reid Paperback R508 R411 Discovery Miles 4 110

 

Partners